aramosf / s3openbucketsLinks
☆23Updated 7 years ago
Alternatives and similar repositories for s3openbuckets
Users that are interested in s3openbuckets are comparing it to the libraries listed below
Sorting:
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- A python script that filters, checks the validity, generates clickable link(s) of subdomain(s), and reports their status☆89Updated 4 years ago
- A Report Generation Tool for Security Assessment☆65Updated 6 years ago
- ❄️ Research project for SubFinder core API V2☆36Updated 6 years ago
- Discover target social media profiles☆81Updated 2 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆55Updated 4 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Updated 5 years ago
- A subdomain reconnaissance scanner☆35Updated 2 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- ☆92Updated 2 years ago
- Endpoint for Out-of-Band Exfiltration (DNS & HTTP)☆92Updated 6 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 7 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- ☆12Updated 2 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Updated 2 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 8 years ago
- Scans a list of websites for Cloudfront or S3 Buckets☆104Updated 3 years ago
- Hunt Open MongoDB instances☆79Updated 5 years ago
- Wraps github api for openly available information about an organization, user, or repo☆130Updated 2 years ago
- Find plaintext credentials from emails in bulk from password dumps, and generate emails on the fly.☆50Updated 6 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- Clickjacking PoC Generator☆35Updated 4 years ago
- The simplest way to take an automated screenshot of given URLs. Easy installation! Edit☆48Updated 7 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 6 years ago